CVE-2024-7559: CWE-94 Improper Control of Generation of Code ('Code Injection') in File Manager File Manager Pro
CVE-2024-7559 is a high-severity vulnerability in the File Manager Pro WordPress plugin affecting all versions up to 8. 3. 7. It allows authenticated users with Subscriber-level access or higher to upload arbitrary files due to missing file type validation and capability checks in the mk_file_folder_manager AJAX action. This flaw can lead to remote code execution on the affected server without requiring user interaction. The vulnerability stems from improper control of code generation (CWE-94), enabling attackers to execute malicious code by uploading crafted files. Exploitation requires only low privileges but no UI interaction, making it relatively easy to exploit remotely. No known exploits are currently reported in the wild, but the high CVSS score of 8. 8 reflects the critical impact potential. Organizations using this plugin should prioritize patching or mitigating this vulnerability to prevent compromise of confidentiality, integrity, and availability of their WordPress sites.
AI Analysis
Technical Summary
CVE-2024-7559 is a critical vulnerability identified in the File Manager Pro plugin for WordPress, affecting all versions up to and including 8.3.7. The vulnerability arises from the mk_file_folder_manager AJAX action, which lacks proper validation of uploaded file types and fails to enforce capability checks. Consequently, authenticated users with as little as Subscriber-level privileges can upload arbitrary files to the server hosting the WordPress site. This improper control of code generation (classified under CWE-94) enables attackers to upload malicious scripts or executable files, potentially leading to remote code execution (RCE). The vulnerability does not require user interaction and can be exploited remotely over the network (AV:N), with low attack complexity (AC:L). The scope is unchanged (S:U), meaning the impact is confined to the vulnerable component but can affect the entire site. The CVSS v3.1 base score is 8.8, indicating high severity with high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the ease of exploitation and the widespread use of WordPress and this plugin make this a significant risk. The vulnerability highlights the importance of strict input validation and proper permission checks in web applications, especially those handling file uploads.
Potential Impact
The vulnerability allows attackers with minimal privileges to upload arbitrary files, which can lead to full remote code execution on the web server. This can compromise the confidentiality of sensitive data stored on the server, allow attackers to modify or delete data (integrity impact), and disrupt website availability through malicious payloads or server manipulation. Organizations relying on WordPress sites with the File Manager Pro plugin are at risk of site defacement, data breaches, malware distribution, and use of the compromised server as a pivot point for further attacks within their network. The attack requires only authenticated access at a low privilege level, increasing the risk from insider threats or compromised low-level accounts. The lack of known exploits in the wild does not diminish the urgency, as proof-of-concept exploits may emerge rapidly given the vulnerability's nature and high CVSS score.
Mitigation Recommendations
Immediate mitigation involves updating the File Manager Pro plugin to a version that addresses this vulnerability once released by the vendor. Until a patch is available, organizations should restrict access to the plugin’s AJAX actions by limiting user roles that can interact with it, ideally removing Subscriber-level users or restricting their capabilities. Implement web application firewall (WAF) rules to detect and block suspicious file upload attempts targeting the mk_file_folder_manager action. Disable or remove the File Manager Pro plugin if not essential. Conduct thorough audits of user accounts to identify and remove unnecessary or suspicious low-privilege accounts. Monitor server logs for unusual file uploads or execution attempts. Employ file integrity monitoring to detect unauthorized changes. Additionally, apply the principle of least privilege to WordPress user roles and ensure that file upload directories have appropriate permissions to prevent execution of uploaded files.
Affected Countries
United States, Germany, United Kingdom, India, Canada, Australia, France, Brazil, Japan, Netherlands, Italy, Spain
CVE-2024-7559: CWE-94 Improper Control of Generation of Code ('Code Injection') in File Manager File Manager Pro
Description
CVE-2024-7559 is a high-severity vulnerability in the File Manager Pro WordPress plugin affecting all versions up to 8. 3. 7. It allows authenticated users with Subscriber-level access or higher to upload arbitrary files due to missing file type validation and capability checks in the mk_file_folder_manager AJAX action. This flaw can lead to remote code execution on the affected server without requiring user interaction. The vulnerability stems from improper control of code generation (CWE-94), enabling attackers to execute malicious code by uploading crafted files. Exploitation requires only low privileges but no UI interaction, making it relatively easy to exploit remotely. No known exploits are currently reported in the wild, but the high CVSS score of 8. 8 reflects the critical impact potential. Organizations using this plugin should prioritize patching or mitigating this vulnerability to prevent compromise of confidentiality, integrity, and availability of their WordPress sites.
AI-Powered Analysis
Technical Analysis
CVE-2024-7559 is a critical vulnerability identified in the File Manager Pro plugin for WordPress, affecting all versions up to and including 8.3.7. The vulnerability arises from the mk_file_folder_manager AJAX action, which lacks proper validation of uploaded file types and fails to enforce capability checks. Consequently, authenticated users with as little as Subscriber-level privileges can upload arbitrary files to the server hosting the WordPress site. This improper control of code generation (classified under CWE-94) enables attackers to upload malicious scripts or executable files, potentially leading to remote code execution (RCE). The vulnerability does not require user interaction and can be exploited remotely over the network (AV:N), with low attack complexity (AC:L). The scope is unchanged (S:U), meaning the impact is confined to the vulnerable component but can affect the entire site. The CVSS v3.1 base score is 8.8, indicating high severity with high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the ease of exploitation and the widespread use of WordPress and this plugin make this a significant risk. The vulnerability highlights the importance of strict input validation and proper permission checks in web applications, especially those handling file uploads.
Potential Impact
The vulnerability allows attackers with minimal privileges to upload arbitrary files, which can lead to full remote code execution on the web server. This can compromise the confidentiality of sensitive data stored on the server, allow attackers to modify or delete data (integrity impact), and disrupt website availability through malicious payloads or server manipulation. Organizations relying on WordPress sites with the File Manager Pro plugin are at risk of site defacement, data breaches, malware distribution, and use of the compromised server as a pivot point for further attacks within their network. The attack requires only authenticated access at a low privilege level, increasing the risk from insider threats or compromised low-level accounts. The lack of known exploits in the wild does not diminish the urgency, as proof-of-concept exploits may emerge rapidly given the vulnerability's nature and high CVSS score.
Mitigation Recommendations
Immediate mitigation involves updating the File Manager Pro plugin to a version that addresses this vulnerability once released by the vendor. Until a patch is available, organizations should restrict access to the plugin’s AJAX actions by limiting user roles that can interact with it, ideally removing Subscriber-level users or restricting their capabilities. Implement web application firewall (WAF) rules to detect and block suspicious file upload attempts targeting the mk_file_folder_manager action. Disable or remove the File Manager Pro plugin if not essential. Conduct thorough audits of user accounts to identify and remove unnecessary or suspicious low-privilege accounts. Monitor server logs for unusual file uploads or execution attempts. Employ file integrity monitoring to detect unauthorized changes. Additionally, apply the principle of least privilege to WordPress user roles and ensure that file upload directories have appropriate permissions to prevent execution of uploaded files.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-08-06T14:09:23.803Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c1ab7ef31ef0b55fee7
Added to database: 2/25/2026, 9:39:38 PM
Last enriched: 2/26/2026, 3:42:25 AM
Last updated: 2/26/2026, 8:05:17 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.